Search Bit Rot

#Tips

Living off the land is essential when it comes to penetrating networks. The box that you landed on may be bare bones with only the default corporate software installed. Infiltrating and exfiltrating data is critical to mission success. This cheatsheet is not all inclusive, but should give you a good starting point for organic file transfer mechanisms.

I’m a security Analyst that does research both for his job and for the fun of it. My main focus is with Mac OSX. This post is going to cover OSX. Same concepts can be applied to Linux and if I feel up to it i’ll add Windows as well.